Editor's Comment: Foreign currency seller Travelex was forced recently to take down its website, following a cyber-attack. Although the company said shortly afterwards that an early investigation had been conducted...

Editor's Comment: It seems timely - and a positive outcome - to see the UK privacy watchdog has ruled that any police force or private organisation using live facial recognition technology is processing personal data and needs to pay attention to data protection laws...

Critical massCritical asset owners increasingly have to protect their ICT infrastructures against cyber attacks. It's no longer enough for the supplier of a single machine component or subcomponent to claim it is cyber-secure - the entire machine must be so

Editor's Comment: It seems timely - and a positive outcome - to see the UK privacy watchdog has ruled that any police force or private organisation using live facial recognition technology is processing personal data and needs to pay attention to data protection laws...

Malware Malaise
Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industry's views.

Editor's Comment: Due to the vast amount of sensitive data they hold, educational institutions are a key target for cyberattacks...

Think like an Attacker....Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes - with room to spare. A strategic approach to cyber security has never been more necessary or urgent

Editor's Comment: With cyber threats increasing on a daily basis, the UK government has been recommending that companies of all sizes take a proactive approach when it comes to cybercrime...

Multi-factor authentication... in six takesYour organisation is going down the multi-factor authentication path, but how does it know it's the right one? Adrian Jones, CEO of Swivel Secure, offers some insights into solving that challenge

Editor's Comment: A question: what is Ireland doing right that others are failing to achieve? To put that in context, according to latest research findings, nearly half (45%) of UK organisations have been compromised by phishing attacks in the last two years....

Powerful allianceCYJAX has been working closely for some time now with Oxford University and the Centre for Doctoral Training in Cyber Security - and these 'Deep Dive Days' are really paying off

Editor's Comment: It is disturbing to hear that cyber criminals have placed 617million hacked accounts for sale on the dark web, stemming from 16 separate data breaches....

Facing up to the factsShould we be using facial recognition technology? It's currently a hot topic in the US, where Amazon has asked for government input, while civil liberties groups in both the UK and US are fundamentally opposed to it

Editor's Comment: With Christmas almost upon us, and the New Year celebrations not far behind that, it's time for some sober reflection on the plight of those who've been looking forward to spending the festive season...

NHS breach - the true costThe WannaCry attack that hit the NHS last year, is estimated to have cost the health service a massive £92million. Could such hard-nosed reckoning help in ensuring the NHS is more resilient in future

Editor's Comment: Responsibility for information security is not falling to any one senior executive function, according to the 2018Risk:Value report from NTT Security, which surveyed 1,800 senior decision...

Good news, bad newsIdentity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business

Editor's Comment: When catastrophe strikes, it is only right and just that those at the top have to take the fall...

Ins and outs of cyber resilienceThe European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?

Editor's Comment: A cyber risk survey produced by the London Financial Times has found that 58% of cyber-attacks are attributable to employee behaviour, such as human negligence, accidental disclosure and lost or stolen devices...

Editor's Comment: The level of engagement with the business at the top of our corporate trees can sometimes be breathtaking. In one recent survey, only 55% of those who responded said their organisation's...

Editor's Comment: More than 90% of surveyed senior business leaders agree that strong technology governance contributes to improved business outcomes and increased agility...

Protecting data to protect patients Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights

Editor's Comment:
We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target....

SUBMIT YOUR NOMINATIONS FOR 2017 NOW!
The Computing Security Awards were set up to recognise the solutions and the solution providers that are helping to keep organisations secure. The process to determine the 2017 winners has now begun. Who and what has impressed you most? We invite you now to play your part in these awards by making your nominations....

Editor's Comment: Fraud is taking off at a ferocious rate. The stats are horrific. It now costs the UK economy £193 billion a year and rarely a day goes by without news hitting the headlines of a company falling victim...

Editor's Comment: At a time when ransomware and other attack techniques that exploit insider negligence have become rampant, I was alarmed to hear recently that only 39% of end users believe they take all appropriate steps to protect company data...

Editor's Comment: The recent scandal over O2 cutomers' data appearing for sale on the dark web shook many, not least those directly affected. O2 says it was not a victim of a data breach - hackers actually stole the data from another source nearly three years ago - but that has left many unimpressed...

Editor's Comment: Some interesting figures have just come out from leading analyst Gartner, which reports that worldwide security software revenue totalled $22.1 billion in 2015, a 3.7% increase from 2014...

With today's connected vehicle technologies, the risk of potential cyber security threats is vast - and growing - with cars already forced off the road. What can be done to safeguard these systems and drivers?

Editor's Comment:
Readers will no doubt have seen how the European Court of Justice struck down the Safe Harbor agreement that many companies have been relying on to allow data transfers between the US...

Editor's Comment:This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary...

Editor's Comment:Welcome to the December 2014 issue of the Computing Security Newsletter. One thing you can always be sure of when dealing with emerging technologies is that the stats quoted will almost invariably...

Editor's Comment:It was encouraging to see how the UK's National Crime Agency has joined forces with other agencies such as the FBI in the US to deliver a nationwide alert, urging organisations and individuals to protect themselves against powerful malicious software...

Editor's Comment:A vulnerability in a popular implementation of the Secure Socket Layer (SSL) technology, used to secure internet transactions, has been revealed that has sent the media and industry experts into something of a frenzy, dubbing it 'Heartbleed'...

Editor's Comment: Everywhere you turn, it seems that another malicious attack is taking place. A particularly intriguing one of late - though not if you've been hit by it, of course! - is Kaspersky Lab's discovery of 'The Mask' (aka Careto)...

Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit. It could save you and your customers from the hackers and attackers out there...

Editor's Comment: Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen...

Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical...

Editor's Comment: It was what many people working in London’s financial and banking sectors feared might happen one day: a brutal and sustained attack on their businesses that would leave them in tatters. But these would not be...

While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out...

Editor's Comment: Welcome to the November edition of the Computing Security Newsletter. And let me say straight away what a great night of celebrations it was at the recent 2013 Computing Security Awards, as people from right across...

Editor's Comment: Welcome to the October edition of the Computing Security Newsletter. No matter how high the defences we stack up against them, the more the cybercriminals come back to carry out another frenzied assault...

Editor's Comment: Welcome to the August edition of the Computing Security Newsletter. The threat the UK is facing from cyber attacks is disturbing in its scale and complexity. The Intelligence and Security Committee (ISC) of...

Editor's Comment: Welcome to the July edition of the Computing Security Newsletter. Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage...

Editor's Comment: Hello... and Welcome to the March edition of the Computing Security Newsletter. Here, you will find all the latest news,views and happenings relating to security - and the major issues that businesses are having to engage...